4 members / 95 guests (24 hours)
$0.04
$0.00 (0.00%)
High: $0.00
Low: $0.00
Volume: 0

An Interesting IDB update! And how IDB got even faster.  IDB is fast, reliable, and FREE to use. Just join and start posting!

Re: With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone

Government Intentionally Creates Digital Vulnerabilities, then Intentionally Leaves Them Open … Leaving Us Exposed and Insecure

http://www.zerohedge.com/news/2017-03-08/government-intentionally-creates-digital-vulnerabilities-then-intentionally-leaves-t

-----------------------------------------------------------------------------------------------
 
George Washington's picture
Mar 8, 2017 1:09 PM

 

 

We’ve previously documented that U.S. intelligence agencies are opening us up to hackers, malware and spying by bad guys.

Specifically, American spy agencies have intentionally weakened digital security for many decades. This breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.

It also causes "incalculable" economic damage.

Yesterday, Wikileaks published leaked CIA documents which show how bad the problem is …

The Independent reports:

CIA had “lost control of its arsenal” … That included a range of software and exploits that if real could allow unparalleled control of computers around the world.

 

***

 

It includes software that could allow people to take control of the most popular consumer electronics products used today, claimed WikiLeaks.

 

“‘Year Zero’ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones,” the organisation said in a release.

Edward Snowden comments:

If you’re writing about the CIA/@Wikileaks story, here’s the big deal: first public evidence USG secretly paying to keep US software unsafe.

 


What makes this look real?
Program & office names, such as the JQJ (IOC) crypt series, are real. Only a cleared insider could know them.


If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. pic.twitter.com/kYi0NC2mOp


View image on Twitter

 

 

    •  

 

 

 

 

 

The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.

 


If you're writing about the CIA/@Wikileaks story, here's the big deal: first public evidence USG secretly paying to keep US software unsafe. pic.twitter.com/kYi0NC2mOp


The CIA reports show the USG developing vulnerabilities in US products, then intentionally keeping the holes open. Reckless beyond words.

    •  

 

 

 

 

 

Why is this dangerous? Because until closed, any hacker can use the security hole the CIA left open to break into any iPhone in the world.